Michael A. Adesanya
Senior Security Engineer
****.********@****.*** linkedin.com/in/adewalea1 740-***-****
SUMMARY
Senior Security Engineer / Security Manager with over 8 years of experience delivering cloud security solutions across AWS,Azure, and on-premises infrastructures. Extensive background in Identity and Access Management (IAM), Vulnerability Management, Data Loss Prevention (DLP), SIEM/SOAR integration, and security automation. Adept at implementing industry-leading tools such as AWS Security Hub, GuardDuty, Microsoft Sentinel, Tenable.io, and Rapid7 InsightVM, while aligning security strategies with SOC 2, ISO 27001, NIST 800-53, and other compliance standards. Proven ability to lead cross-functional teams and optimize security operations, resulting in enhanced detection capabilities, reduced attack surfaces, and faster incident response times.
DOMAIN SKILLS
Endpoint Detection and Response (EDR) Systems
Endpoint Management Systems (EMS)
Email Security - Proofpoint
Account Takeover Protection -Proofpoint
Proofpoint Targeted Attack Protection (TAP)
Vulnerability Assessment and Penetration Testing (V.A.P.T.)
Risk Assessment, Threat Assessment, Incident Management, Access Control.
Risk Mitigation, Disaster Recovery, Data Loss Prevention (DLP), Contingency Planning. (CP)
Uses Authentication of SIEM Tools for Audit and Compliance Requirements of HIPAA, GDPR, PCI, Insider Threats, Privileged Access Abuse, Threat Hunting, Alerting, and Effective System Monitoring
Network Configuration, Architecture, Protocols HTTP, Ipv4, Ipv6, DHCP, TCP/IP, VPN, NWF & WAF
Service: Two-factor authentication (2FA), Single Sign-On (SSO), Multi-Factor Authentication (MFA), Federation Service (SAML, OAuth)
Security Standards and controls such as ISO 27001/2
User Security Awareness Training.
CERTIFICATIONS
CISM Certified Information Security Manager (ISACA)
Proficiency in information security management covering domains such as information security governance, risk management, information security program development and management, and incident management.
C EH (Practical) EC-Council
Ethical hacking techniques such as threat vector identification, network scanning, OS (Operating System) detection, vulnerability analysis, system hacking, web app hacking and Protection, etc.
Security+ (CompTIA)
Standardized professionals' network, infrastructure, administration, and security
Network+ (CompTIA)
Standardized professional network infrastructure and administration.
Agile Scrum (International Scrum Institute)
Standardized and Evolving Agile Scrum Principles and Best Practices
TECHNICAL SKILLS
Scripting Language:
Terraform, Ansible, Bash, PowerShell, Kusto Query Language (KQL), Search Processing Language (SPL), Python
SIEM & Security Tools:
Splunk Cloud/Enterprise, Azure Sentinel, LogRhythm, Cisco Firepower (NGFW), Cisco Umbrella, Cisco SecureX, Nessus Enterprise, Rapid7, InsightVM, CyberArk (PIM) Solution, CrowdStrike, Palo Alto Cortex XDR, Defender XDR Solution, Kali Linux tools.
Cloud environment
Cloud Operations - Cloud Security Architecture, Incident Detection and Response, Security Automation, Access Control and IAM Integration, Data Encryption and Privacy, Security Compliance, Threat Intelligence Integration, Cloud Architectural Diagraming
Computer Services - Virtual machine type selection, Deployment, backups, Maintenance, performance scaling, and Security
Virtual Networking - addressing and interconnectivity, security groups and ACLs, endpoint services, address translation, application and network load balancing, API gateways.
Platform protection - Network security group, Application Security group, Application Gateway, Virtual Network peering, VPN, Firewall, Front door, etc.
Azure - Azure Defender for Cloud, Azure Active Directory (Azure AD) Identity Protection, Azure Firewall, Azure Sentinel, Azure Policy, Azure Multi-Factor Authentication (MFA), Azure AD Conditional Access, Azure Network Security, Azure AD Privileged Identity Management
AWS - AWS Services: IAM, VPC, Security Groups, NACLs, AWS WAF, AWS Shield, AWS Security Hub, AWS Inspector, AWS Config, CloudTrail Security Tools: AWS GuardDuty, AWS Macie related Security tools
Framework & Compliance
NIST, FISMA, HIPPA, PCI DSS, SOC2, Framework & Compliance
EXPERIENCE
VIANT MEDICAL Jun 2024 – Present
Senior Security Engineer
Led cross-functional collaboration sessions to provide technical expertise in product planning, resolve complex technical roadblocks, and drive the successful implementation of security solutions across multi-cloud environments.
Mentored and coached junior engineers, fostering foundational engineering skills, promoting professional growth, and building a high-performing security team.
Architected and deployed multi-cloud security solutions leveraging Microsoft Sentinel, AWS Security Hub, and AI-powered analytics to create a unified SIEM platform. Achieved a 75% improvement in threat visibility by centralizing logging from CloudTrail, Azure Monitor, and on-prem devices.
Implemented AI-driven threat detection tools, including AWS GuardDuty and Microsoft Defender for Identity, reducing undetected anomalies by 40% and mitigating 80% of identity-based attacks through advanced behavioral analysis.
Developed custom automation playbooks using Azure Sentinel and SOAR platforms to streamline incident response workflows, reducing Mean Time to Resolve (MTTR) by 70% and enhancing SOC productivity.
Engineered identity-based threat detection systems by integrating Microsoft Defender for Endpoint (MDE) with Azure AD. Automated detection and response for compromised accounts, reducing time-to-detect by 60% while adhering to Zero Trust principles.
Designed enterprise-wide Identity and Access Management (IAM) frameworks with AI-enhanced access anomaly detection. Enforced least privilege policies using AWS IAM Access Analyzer and Azure PIM, reducing the attack surface across multi-account environments.
Deployed AWS Macie for Data Loss Prevention (DLP), automatically scanning S3 buckets for sensitive information such as PII and credit card data. Reduced data exposure risks and improved compliance with GDPR and PCI DSS.
Developed and managed Data Loss Prevention (DLP) policies using Microsoft Purview, implementing automated data exfiltration alerts that reduced data leakage events by 35%. Ensured compliance with GDPR, HIPAA, and PCI DSS through detailed security reporting and periodic audits.
Spearheaded third-party vendor risk assessments for 20+ vendors using SOC2, NIST 800-53, and ISO 27001 standards. Achieved 100% compliance while reducing third-party risk exposure by 35%.
Led the implementation of a vulnerability management program utilizing Rapid7 InsightVM for real-time scanning and AI-based prioritization. Reduced critical vulnerability remediation timelines from 60 days to 20 days, achieving a 98% remediation rate within the first 90 days.
Integrated advanced AI-driven analytics into SOC workflows, optimizing incident correlation between Microsoft Sentinel and Defender XDR. Reduced incident duplication by 85%, enabling faster escalation and resolution across hybrid cloud environments.
Configured and optimized SPF, DKIM, and DMARC records for Viant domain hosted on GoDaddy to establish strong email authentication and prevent domain spoofing.
Integrated Office 365 with custom DNS security policies, ensuring alignment with Microsoft’s email infrastructure and improving overall mail deliverability.
Leveraged Proofpoint Email Protection to deploy advanced inbound and outbound threat filtering, including protection against phishing, malware, and spoofing attacks.
Implemented DMARC policy in monitor mode, and progressively enforced to quarantine/reject unauthorized email sources based on actionable feedback from aggregated DMARC reports.
Utilized Proofpoint TAP (Targeted Attack Protection) to analyze malicious URLs and attachments in real time, proactively defending against zero-day threats.
Tuned Proofpoint DLP (Data Loss Prevention) policies to ensure regulatory compliance and prevent sensitive data exfiltration over email.
Automated email threat response using Proofpoint TRAP (Threat Response Auto-Pull), reducing mean time to respond (MTTR) and limiting exposure from malicious messages.
CGI INC. Dayton, Ohio Jun 2022 – June 2024
Lead Security Engineer
Played a pivotal role in the development and implementation of security engineering roadmaps, aligning technical strategies with organizational objectives, and ensuring continuous improvement in organization security posture.
Conducted assessments to ensure compliance with regulatory requirements, as well as adherence to cloud providers security best practices and frameworks (CIS Benchmarks, Azure, AWS Security Best practices).
Developed risk mitigation strategies and recommendations tailored to the Multi-cloud and On-prom environment, such as implementing access controls, encryption mechanisms, and monitoring solutions, in collaboration with cloud architects.
Provided leadership and technical expertise in the design, deployment, and maintenance of security solutions such as SIEM/SOAR, EDR and XDR, PIM, and PAM solutions, ensuring comprehensive protection against evolving cyber threats and enable control, monitoring, and audit all activities of privileged access.
Collaborated with management level stakeholder Onboarding multiple Endpoint Security solutions (Microsoft XDR, Cortex XDR, CrowdStrike) across multiple environments to provide comprehensive endpoint protection and advanced threat detection capabilities.
Seamlessly integrated Microsoft Sentinel, AWS Security Hub, and third-party security tools (Cisco Firepower, Secure, Splunk, Syslog etc.) to provide a comprehensive view of security across cloud and on-premises environments.
Automated deployment and management of security tool agents, including Azure OMS, Rapid7, and Cortex XDR agent, leveraging Ansible, resulting in a 40% reduction in manual effort and enhancing the overall cybersecurity posture.
Utilized scripting and automation tools such as PowerShell, Azure CLI, ARM templates, or terraform for efficient management and configuration of cloud resources.
Implemented automated response actions using Azure Logic Apps and Azure Functions within Azure Sentinel to orchestrate incident response workflows and streamline remediation efforts.
Customized and fine-tuned alerting and reporting mechanisms within EDR, XDR solutions to prioritize and respond effectively to security incidents based on organizational risk profiles.
Facilitated comprehensive Vulnerability Assessment and Penetration Testing (VAPT) to identify and remediate security weaknesses, ensuring the resilience of organization's infrastructure and landscape against potential cyber threats.
INDIANA STATE UNIVERSITY Jun 2020 – May 2022
Lead Security Engineer
Drove the development and review of comprehensive security documentation (Security policies and procedures, SOPs, SSP, Risk Assessment, etc.,) to ensure strict adherence compliance standards.
Coordinated and led a dynamic cross-functional security team and system administrators, fostering collaboration in responding to security incidents and resolution, minimizing impact on organizational data assets.
Led deployment, configuration, and maintenance of multiple SIEM (Splunk) for different departments monitoring security events, triggering and resolving security incidents
Streamlined threat detection and response times by 50% by spearheading implementation and utilization Splunk resulting in improved visibility, incident management, and minimized security incident impact operations.
Developed policies and procedures for identity governance, including role-based access control (RBAC) and least-privilege principles, enhancing organizational security posture.
Utilized Microsoft Defender XDR's integration with threat intelligence feeds and machine learning models to enhance detection efficacy and stay ahead of emerging cyber threats.
Provided training and mentoring junior analysts and IT staff on security best practices.
Architected seamless integration of access control and Identity and Access Management (IAM) solutions, strategically enforcing the principle of least privilege access. This innovative approach elevated the overall security posture and streamlined secure access management across the organization.
Partner with vendors and internal teams to conduct assessments and optimize security solutions, maximizing their value and effectiveness.
PJ PROS. IT SERVICES
Navy Federal Credit Union Jul 2019 – Jun 2020
Cloud Security Engineer
Led assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development, application security, data protection, cryptography, key management, identity and access management, network security) within SaaS, IaaS, PaaS in cloud environments.
Implemented robust monitoring systems leveraging Azure Log Analytics, Cloud Apps, Microsoft Security Center, and Azure Sentinel to ensure system availability and respond swiftly to alerts, effectively investigating and mitigating threats, and security breaches.
Conducted correlation of security incidents and events to bolster threat detection and prevention capabilities, while establishing baselines for network traffic and host activity enterprise wide.
Implemented data encryption and key management solutions for Azure and AWS resources, including virtual machines, databases, and storage volumes, to protect sensitive information at rest and in transit and mitigate the risk of data breaches and unauthorized access.
Led the deployment of zero-touch provision utilizing Windows Autopilot, Apple Device Enrollment, and Android Enrollment for over 10,000 devices across multiple client environments.
Ensured 100% adherence to hardening standards via CIS, and Microsoft Security Benchmarks through successful implementation of compliance security assessment scan of organizational infrastructure and devices, bolstering overall security posture.
Contributed to the development of comprehensive security documentation, encompassing security policies and procedures, risk assessment plans, system security plans, contingency plans, and security tests, aligning with FIPS and NIST security standards.
Aligned organizational security policies with regulatory frameworks like HIPAA, PCI-DSS, and NIST SP 800-53, resulting in improved compliance and security posture, reducing potential security risks, and avoiding regulatory risk for the business.
EPSON AMERICA Jan 2018 – Jun 2019
Endpoint Security Analyst
Deployed zero-touch provisioning with Windows Autopilot, Apple Device Enrollment, and Android Enrollment for over 3000 Devices and ongoing.
Reviewed, Investigated, and analyzed event logs using Azure Monitor, Cloud App Security, Office 365 Compliance & Security Center
Ensured device and app compliance to control data flow outside trusted mobile apps and devices through mobile app management (MAM) and mobile device management (MDM) policies.
Onboard managed, and reported on encryption, antivirus, firewall, and other security technologies to protect work data.
Provided comprehensive administration and support for Office 365 users and applications, overseeing licensing, email account management, and online data integrity.
Conducted thorough reviews, investigations, and analysis of event logs utilizing Azure Monitor, Cloud App Security, and Office 365 Compliance & Security Center, ensuring proactive identification and mitigation of potential security threats.
Enforced device and app compliance measures to regulate data flow outside trusted mobile apps and devices, leveraging mobile app management (MAM) and mobile device management (MDM) policies for enhanced security.
Implemented and optimized SIEM (Security Information and Event Management) solutions to provide real-time analysis of security alerts and ensure a swift response to potential threats.
Conducted regular security assessments and audits to identify vulnerabilities and gaps in existing security measures, recommending and implementing remediation strategies to enhance overall security posture.
Work in partnership with internal stakeholders to develop and enforce security policies, procedures, and guidelines, ensuring compliance with industry standards and regulations such as GDPR, HIPAA, and PCI-DSS.
HHC OF MARION COUNTY Mar 2017 – May 2018
System Security Administrator
Spearheaded the design, implementation, and management of comprehensive endpoint security strategies, including antivirus solutions, endpoint detection and response (EDR) systems, and data loss prevention (DLP) tools, resulting in a significant reduction in security incidents.
Coordinated the configuration and deployment of SIEM (Security Information and Event Management) solutions, leveraging advanced correlation techniques and threat intelligence integration to enhance threat detection and response capabilities.
Collaborated closely with cross-functional teams to develop and implement security policies, procedures, and guidelines aligned with regulatory requirements such as HIPAA, PCI-DSS, and the NIST Risk Management Framework, ensuring continuous compliance and risk mitigation.
Played a key role in the evaluation, selection, and implementation of security solutions, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure web gateways, to strengthen the organization's overall security posture and resilience against evolving threats.
Provided expert guidance and support to internal teams on security-related matters, including incident response procedures, vulnerability management practices, and security awareness training initiatives, fostering a culture of security awareness and accountability throughout the organization.
Acted as a liaison between technical and non-technical stakeholders, translating business requirements and regulatory mandates into actionable security controls and risk management strategies, facilitating cross-functional collaboration and alignment.
Maintained up-to-date knowledge of emerging threats, vulnerabilities, and industry best practices in cybersecurity, proactively researching and evaluating new technologies and methodologies to enhance the organization's security posture and resilience against cyber threats.
CONCRETE BY DESIGN Mar 2016 – Feb 2017
System Security Analyst
Proficient in leveraging endpoint security tools like CrowdStrike, Carbon Black, or Symantec Endpoint Protection to detect and mitigate threats effectively.
Engineered and sustained robust access controls, including RBAC (Role-Based Access Control), to safeguard sensitive resources.
Orchestrated configuration and vigilant monitoring of firewalls such as Cisco ASA, Cisco Firepower, Palo Alto
Conducted routine and meticulous vulnerability scans utilizing tools like Nessus and Rapid 7
Employed cutting-edge SIEM tools such as Splunk, LogRhythm, to orchestrate comprehensive security information and event management.
Developed and enforced security policies aligned with industry standards (e.g., ISO 27001, NIST).
Implemented and managed cutting-edge antivirus, anti-malware, and endpoint detection and response (EDR) solutions.
COURTEVILLE BUSINESS SOLUTIONS PLC Jan 2012 – Jan 2016
Information Technology Security Administrator
Developed and enforced security policies, procedures, and guidelines.
Conducted security awareness training for employees to promote best practices.
Conducted risk assessments to identify vulnerabilities and prioritize remediation efforts.
Implemented risk mitigation strategies to minimize exposure to threats.
Managed and monitored access controls, including user permissions, authentication mechanisms, and role-based access, to safeguard critical systems and resources from unauthorized access.
Collaborated with internal teams and external vendors to evaluate and integrate new security technologies and solutions, ensuring continuous improvement of the security posture.
Configured firewalls, intrusion detection/prevention systems, and VPNs to protect network infrastructure.
PROJECT HIGHLIGHTS
IAM and RBAC Implementation for Hybrid Cloud Environment
Led a project to implement role-based access control (RBAC) in a hybrid cloud environment using Azure AD and AWS IAM. Integrated MFA and conditional access policies, significantly reducing account takeover risks and unauthorized access attempts by 25%.
Automated Incident Response Using SOAR
Automated incident response workflows using Cortex XSOAR integrated with Microsoft Sentinel and AWS Security Hub, reducing incident resolution times from 4 hours to 30 minutes for common security events like phishing and malware alerts.
Cloud Security Migration to AWS
Directed a cloud security migration project, utilizing AWS native security tools such as AWS Shield, GuardDuty, and AWS KMS to secure sensitive workloads. Ensured end-to-end encryption, compliance with SOC 2 standards, and improved cloud security monitoring.
Vulnerability Management Program Overhaul
Overhauled the vulnerability management process using Tenable.io for dynamic scanning and Rapid7 InsightVM for prioritization. Achieved a 98% patching success rate for critical vulnerabilities within 30 days of detection.